├── .gitmodules ├── LICENSE ├── README.md ├── ascii-shellcode-encoder.py ├── bin2shellcode.py ├── encshell.py ├── execve.c ├── find-aslr-collision.sh ├── findInstr.sh ├── format_string_vuln_gen.py ├── kernel_dump_seh.wds ├── memory-occupied-by-process.sh ├── pexpect-interactive.py ├── printable.sh ├── python_memory_dump.py ├── request2size.c ├── shellc2bin.py ├── shellcode_win32_netw_active.asm └── shellcode_win32_spawn_cmd.asm /.gitmodules: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/.gitmodules -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/README.md -------------------------------------------------------------------------------- /ascii-shellcode-encoder.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/ascii-shellcode-encoder.py -------------------------------------------------------------------------------- /bin2shellcode.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/bin2shellcode.py -------------------------------------------------------------------------------- /encshell.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/encshell.py -------------------------------------------------------------------------------- /execve.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/execve.c -------------------------------------------------------------------------------- /find-aslr-collision.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/find-aslr-collision.sh -------------------------------------------------------------------------------- /findInstr.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/findInstr.sh -------------------------------------------------------------------------------- /format_string_vuln_gen.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/format_string_vuln_gen.py -------------------------------------------------------------------------------- /kernel_dump_seh.wds: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/kernel_dump_seh.wds -------------------------------------------------------------------------------- /memory-occupied-by-process.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/memory-occupied-by-process.sh -------------------------------------------------------------------------------- /pexpect-interactive.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/pexpect-interactive.py -------------------------------------------------------------------------------- /printable.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/printable.sh -------------------------------------------------------------------------------- /python_memory_dump.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/python_memory_dump.py -------------------------------------------------------------------------------- /request2size.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/request2size.c -------------------------------------------------------------------------------- /shellc2bin.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/shellc2bin.py -------------------------------------------------------------------------------- /shellcode_win32_netw_active.asm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/shellcode_win32_netw_active.asm -------------------------------------------------------------------------------- /shellcode_win32_spawn_cmd.asm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mgeeky/Exploit-Development-Tools/HEAD/shellcode_win32_spawn_cmd.asm --------------------------------------------------------------------------------